{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:56:07Z","timestamp":1775181367708,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:00:00Z","timestamp":1656720000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:00:00Z","timestamp":1656720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s00607-022-01100-6","type":"journal-article","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T10:02:52Z","timestamp":1656756172000},"page":"2605-2633","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A clustering approach for software defect prediction using hybrid social mimic optimization algorithm"],"prefix":"10.1007","volume":"104","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8107-5183","authenticated-orcid":false,"given":"K","family":"Thirumoorthy","sequence":"first","affiliation":[]},{"given":"J Jerold John","family":"Britto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,2]]},"reference":[{"key":"1100_CR1","first-page":"288","volume":"9","author":"M Rawat","year":"2012","unstructured":"Rawat M, Dubey S (2012) Software defect prediction models for quality improvement: A literature study. Interl J Comput Sci Issues 9:288\u2013296","journal-title":"Interl J Comput Sci Issues"},{"issue":"1","key":"1100_CR2","first-page":"28","volume":"12","author":"C Manjula","year":"2018","unstructured":"Manjula C, Florence L (2018) Hybrid approach for software defect prediction using machine learning with optimization technique. Inter J Comput Inf Eng 12(1):28\u201332","journal-title":"Inter J Comput Inf Eng"},{"issue":"11","key":"1100_CR3","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TSE.2018.2877678","volume":"46","author":"Z Wan","year":"2020","unstructured":"Wan Z, Xia X, Hassan AE, Lo D, Yin J, Yang X (2020) Perceptions, expectations, and challenges in defect prediction. IEEE Trans Software Eng 46(11):1241\u20131266","journal-title":"IEEE Trans Software Eng"},{"key":"1100_CR4","volume-title":"Data mining concepts and techniques","author":"J Han","year":"2012","unstructured":"Han J, Kamber M, Pei J (2012) Data mining concepts and techniques, 3rd edn. Morgan Kaufmann Publishers, Burlington, Massachusetts","edition":"3"},{"key":"1100_CR5","doi-asserted-by":"crossref","unstructured":"Chug A, Dhall S (2013) Software defect prediction using supervised learning algorithm and unsupervised learning algorithm. In: Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp.\u00a0173\u2013179","DOI":"10.1049\/cp.2013.2313"},{"key":"1100_CR6","doi-asserted-by":"crossref","unstructured":"Rahim A, Hayat Z, Abbas M, Rahim A, Rahim MA (2021) Software defect prediction with na\u00efve bayes classifier. In: 2021 International Bhurban Conference on Applied Sciences and Technologies (IBCAST), pp.\u00a0293\u2013297","DOI":"10.1109\/IBCAST51254.2021.9393250"},{"key":"1100_CR7","doi-asserted-by":"publisher","first-page":"1412","DOI":"10.1016\/j.procs.2018.05.071","volume":"132","author":"S Pandey","year":"2018","unstructured":"Pandey S, Mishra R, Tripathi A (2018) Software bug prediction prototype using bayesian network classifier: A comprehensive model. Procedia Comput Sci 132:1412\u20131421","journal-title":"Procedia Comput Sci"},{"key":"1100_CR8","doi-asserted-by":"crossref","unstructured":"Aljamaan H, Alazba A (2020) Software defect prediction using tree-based ensembles. PROMISE 2020, (New York, NY, USA), p.\u00a01\u201310, Association for Computing Machinery","DOI":"10.1145\/3416508.3417114"},{"key":"1100_CR9","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00607-016-0489-6","volume":"99","author":"S Rathore","year":"2017","unstructured":"Rathore S, Kumar S (2017) A decision tree logic based recommendation system to select software fault prediction techniques. Comput 99:255\u2013285","journal-title":"Comput"},{"key":"1100_CR10","doi-asserted-by":"publisher","first-page":"461","DOI":"10.12785\/ijcds\/080503","volume":"8","author":"M Hammad","year":"2019","unstructured":"Hammad M, Alqaddoumi A, Alobaidy H, Almseidein K (2019) Predicting software faults based on k-nearest neighbors classification. Intern J Comput Digital Syst 8:461\u2013467","journal-title":"Intern J Comput Digital Syst"},{"key":"1100_CR11","first-page":"25633","volume":"9","author":"M Thangavel","year":"2014","unstructured":"Thangavel M, Nasira G (2014) Support vector machine for software defect prediction. Int J Appl Eng Res 9:25633\u201325644","journal-title":"Int J Appl Eng Res"},{"key":"1100_CR12","first-page":"19","volume":"15","author":"X Rong","year":"2016","unstructured":"Rong X, Li F, Cui Z (2016) A model for software defect prediction using support vector machine based on cba. Int J Intell Syst Technol Appl 15:19","journal-title":"Int J Intell Syst Technol Appl"},{"key":"1100_CR13","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TKDE.2011.163","volume":"24","author":"P Bishnu","year":"2012","unstructured":"Bishnu P, Bhattacharjee V (2012) Software fault prediction using quad tree-based k-means clustering algorithm. Knowl Data Eng, IEEE Trans on 24:1146\u20131150","journal-title":"Knowl Data Eng, IEEE Trans on"},{"key":"1100_CR14","first-page":"199","volume":"8","author":"M Park","year":"2014","unstructured":"Park M, Hong E (2014) Software fault prediction model using clustering algorithms determining the number of clusters automatically. Inter J Software Eng Appl 8:199\u2013204","journal-title":"Inter J Software Eng Appl"},{"key":"1100_CR15","doi-asserted-by":"publisher","first-page":"328","DOI":"10.26555\/ijain.v6i3.484","volume":"6","author":"R Annisa","year":"2020","unstructured":"Annisa R, Rosiyadi D, Riana D (2020) Improved point center algorithm for k-means clustering to increase software defect prediction. Inter J Adv Intell Inform 6:328","journal-title":"Inter J Adv Intell Inform"},{"key":"1100_CR16","volume":"12","author":"W Almayyan","year":"2021","unstructured":"Almayyan W (2021) Towards predicting software defects with clustering techniques. Inter J Artif Intell Appl 12:114595","journal-title":"Inter J Artif Intell Appl"},{"key":"1100_CR17","doi-asserted-by":"crossref","unstructured":"Henein MMR, Shawky D, Abd-El-Hafiz S (2018) Clustering-based under-sampling for software defect prediction. In: ICSOFT","DOI":"10.5220\/0006911402190227"},{"key":"1100_CR18","first-page":"1","volume":"2","author":"R Islam","year":"2017","unstructured":"Islam R, Sakib K (2017) A package-based clustering approach to enhance the accuracy and performance of software defect prediction. Inter J Softw Eng, Technol Appl 2:1\u201321","journal-title":"Inter J Softw Eng, Technol Appl"},{"key":"1100_CR19","doi-asserted-by":"crossref","unstructured":"Singh S, Singla R (2016) Comparative performance of fault-prone prediction classes with k-means clustering and mlp. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS \u201916, (New York, NY, USA), Association for Computing Machinery","DOI":"10.1145\/2905055.2905123"},{"key":"1100_CR20","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-10389-1_13","volume":"569","author":"G Abaei","year":"2015","unstructured":"Abaei G, Selamat A (2015) Increasing the accuracy of software fault prediction using majority ranking fuzzy clustering. Stud Comput Intell 569:179\u2013193","journal-title":"Stud Comput Intell"},{"key":"1100_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114595","volume":"172","author":"SK Pandey","year":"2021","unstructured":"Pandey SK, Mishra RB, Tripathi AK (2021) Machine learning based methods for software fault prediction: A survey. Expert Syst Appl 172:114595","journal-title":"Expert Syst Appl"},{"key":"1100_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.4236\/jsea.2019.125007","volume":"12","author":"A Alsaeedi","year":"2019","unstructured":"Alsaeedi A, Khan M (2019) Software defect prediction using supervised machine learning and ensemble techniques: A comparative study. J Softw Eng Appl 12:85\u2013100","journal-title":"J Softw Eng Appl"},{"key":"1100_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113085","volume":"144","author":"S Pandey","year":"2019","unstructured":"Pandey S, Mishra R, Tripathi A (2019) Bpdet: An effective software bug prediction model using deep representation and ensemble learning techniques. Expert Syst Appl 144:113085","journal-title":"Expert Syst Appl"},{"key":"1100_CR24","doi-asserted-by":"crossref","unstructured":"Assim M, Obeidat Q, Hammad M (2020) Software defects prediction using machine learning algorithms. In: 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI), pp.\u00a01\u20136","DOI":"10.1109\/ICDABI51230.2020.9325677"},{"key":"1100_CR25","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.3844\/jcssp.2020.1558.1569","volume":"16","author":"S Nur","year":"2020","unstructured":"Nur S, Wei K, Kew S (2020) Machine learning techniques for software bug prediction: A systematic review. J Comput Sci 16:1558\u20131569","journal-title":"J Comput Sci"},{"key":"1100_CR26","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.neucom.2019.11.067","volume":"385","author":"L Qiao","year":"2020","unstructured":"Qiao L, Li X, Umer Q, Guo P (2020) Deep learning based software defect prediction. Neurocomputing 385:100\u2013110","journal-title":"Neurocomputing"},{"key":"1100_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJOSSP.2019100101","volume":"10","author":"O Alqasem","year":"2019","unstructured":"Alqasem O, Akour M (2019) Software fault prediction using deep learning algorithms. Inter J Open Source Softw Process 10:1\u201319","journal-title":"Inter J Open Source Softw Process"},{"key":"1100_CR28","doi-asserted-by":"crossref","unstructured":"Li J, He P, Zhu J, Lyu MR (2017) Software defect prediction via convolutional neural network. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp.\u00a0318\u2013328","DOI":"10.1109\/QRS.2017.42"},{"key":"1100_CR29","doi-asserted-by":"publisher","first-page":"63945","DOI":"10.1109\/ACCESS.2020.2985290","volume":"8","author":"OA Qasem","year":"2020","unstructured":"Qasem OA, Akour M, Alenezi M (2020) The influence of deep learning algorithms factors in software fault prediction. IEEE Access 8:63945\u201363960","journal-title":"IEEE Access"},{"key":"1100_CR30","doi-asserted-by":"crossref","unstructured":"Ayon SI (2019) Neural network based software defect prediction using genetic algorithm and particle swarm optimization. In: 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), pp.\u00a01\u20134","DOI":"10.1109\/ICASERT.2019.8934642"},{"key":"1100_CR31","doi-asserted-by":"crossref","unstructured":"Zhao G, Huang J (2018) Deepsim: Deep learning code functional similarity. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2018, (New York, NY, USA), p.\u00a0141\u2013151, Association for Computing Machinery","DOI":"10.1145\/3236024.3236068"},{"key":"1100_CR32","doi-asserted-by":"crossref","unstructured":"Zheng W, Mo S, Jin X, Qu Y, Xie Z, Shuai J (2019) Software defect prediction model based on improved deep forest and autoencoder by forest, pp.\u00a0419\u2013424","DOI":"10.18293\/SEKE2019-008"},{"key":"1100_CR33","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.3390\/math9111180","volume":"9","author":"E Akimova","year":"2021","unstructured":"Akimova E, Bersenev A, Deikov A, Kobylkin K, Konygin A, Mezentsev I, Misilov V (2021) A survey on software defect prediction using deep learning. Math 9:1180","journal-title":"Math"},{"issue":"1","key":"1100_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12046-020-01443-w","volume":"45","author":"K Thirumoorthy","year":"2020","unstructured":"Thirumoorthy K, Muneeswaran K (2020) Optimal feature subset selection using hybrid binary jaya optimization algorithm for text classification. S\u0101dhan\u0101 45(1):1\u201313","journal-title":"S\u0101dhan\u0101"},{"issue":"8","key":"1100_CR35","first-page":"1490","volume":"8","author":"C Gunavathi","year":"2014","unstructured":"Gunavathi C, Premalatha K (2014) Performance analysis of genetic algorithm with knn and svm for feature selection in tumor classification. Inter J Comput Inf Eng 8(8):1490\u20131497","journal-title":"Inter J Comput Inf Eng"},{"key":"1100_CR36","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.jocs.2017.07.018","volume":"25","author":"L Abualigah","year":"2018","unstructured":"Abualigah L, Khader AT, Hanandeh E (2018) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. J Comput Sci 25:456\u2013466","journal-title":"J Comput Sci"},{"key":"1100_CR37","first-page":"2347","volume":"13","author":"R Najeeb","year":"2018","unstructured":"Najeeb R, Dhannoon BN (2018) A feature selection approach using binary firefly algorithm for network intrusion detection system. ARPN J Eng Applied Sci 13:2347\u20132352","journal-title":"ARPN J Eng Applied Sci"},{"key":"1100_CR38","first-page":"1","volume":"1767","author":"R Malhotra","year":"2021","unstructured":"Malhotra R, Shakya A, Ranjan R, Banshi R (2021) Software defect prediction using binary particle swarm optimization with binary cross entropy as the fitness function. J Phys: Conf Ser 1767:1\u201310","journal-title":"J Phys: Conf Ser"},{"key":"1100_CR39","doi-asserted-by":"crossref","unstructured":"Khuat T, Hanh LM (2019) Binary teaching-learning based optimization algorithm with a new update mechanism for sample subset optimization in software defect prediction. Soft Computing, 23:9919\u20139935","DOI":"10.1007\/s00500-018-3546-6"},{"issue":"15","key":"1100_CR40","first-page":"1","volume":"9","author":"RA Khurma","year":"2021","unstructured":"Khurma RA, Alsawalqah H, Aljarah I, Elaziz MA, Dama\u0161evi\u010dius R (2021) An enhanced evolutionary software defect prediction method using island moth flame optimization. Math 9(15):1\u201320","journal-title":"Math"},{"key":"1100_CR41","doi-asserted-by":"crossref","unstructured":"Malhotra R, Nishant N, Gurha S, Rathi V (2021) Application of particle swarm optimization for software defect prediction using object oriented metrics. In: 2021 11th International Conference on Cloud Computing, Data Science Engineering (Confluence), pp.\u00a088\u201393","DOI":"10.1109\/Confluence51648.2021.9377116"},{"key":"1100_CR42","doi-asserted-by":"crossref","unstructured":"Panda M, Azar A (12 2020) Hybrid multi-objective Grey Wolf search optimizer and machine learning approach for software bug prediction: Hybrid multi-objective Grey Wolf search optimizer for software bug prediction pp.\u00a01\u201324","DOI":"10.4018\/978-1-7998-5788-4.ch013"},{"key":"1100_CR43","doi-asserted-by":"publisher","first-page":"10925","DOI":"10.1007\/s10586-017-1235-3","volume":"22","author":"M Anbu","year":"2019","unstructured":"Anbu M, Anandha Mala GS (2019) Feature selection using firefly algorithm in software defect prediction. Clust Comput 22:10925\u201310934","journal-title":"Clust Comput"},{"key":"1100_CR44","doi-asserted-by":"crossref","first-page":"14291","DOI":"10.37622\/IJAER\/13.5.2018.2955-2958","volume":"13","author":"K Kumar","year":"2018","unstructured":"Kumar K, Gyani J, Narsimha G (2018) Software defect prediction using ant colony optimization. Int J Appl Eng Res 13:14291\u201314297","journal-title":"Int J Appl Eng Res"},{"key":"1100_CR45","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.eswa.2019.05.035","volume":"134","author":"S Balochian","year":"2019","unstructured":"Balochian S, Baloochian H (2019) Social mimic optimization algorithm and engineering applications. Expert Syst Appl 134:178\u2013191","journal-title":"Expert Syst Appl"},{"key":"1100_CR46","doi-asserted-by":"crossref","unstructured":"Akour M, Melhem W (01 2020) Software Defect Prediction Using Genetic Programming and Neural Networks, pp.\u00a01577\u20131597","DOI":"10.4018\/978-1-7998-0414-7.ch088"},{"key":"1100_CR47","first-page":"10","volume":"32","author":"X Cai","year":"2019","unstructured":"Cai X, Niu Y, Geng S, Cui Z, Li J, Chen J (2019) An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search. Concurr Comput: Pract Exp 32:10","journal-title":"Concurr Comput: Pract Exp"},{"key":"1100_CR48","doi-asserted-by":"publisher","first-page":"173548","DOI":"10.1109\/ACCESS.2020.3024108","volume":"8","author":"A Hussien","year":"2020","unstructured":"Hussien A, Amin M, Wang M, Liang G, Alsanad A, Gumaei A, Chen H (2020) Crow search algorithm: Theory, recent advances, and applications. IEEE Access 8:173548\u2013173565","journal-title":"IEEE Access"},{"key":"1100_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2017.04.008","volume":"37","author":"R Venkata Rao","year":"2017","unstructured":"Venkata Rao R, Saroj A (2017) A self-adaptive multi-population based jaya algorithm for engineering optimization. Swarm Evol Comput 37:1\u201326","journal-title":"Swarm Evol Comput"},{"key":"1100_CR50","volume-title":"Mahout in action","author":"S Owen","year":"2011","unstructured":"Owen S, Anil R, Dunning T, Friedman E (2011) Mahout in action. Manning Publications Co., Shelter Island, New York"},{"key":"1100_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115040","volume":"178","author":"K Thirumoorthy","year":"2021","unstructured":"Thirumoorthy K, Muneeswaran K (2021) A hybrid approach for text document clustering using jaya optimization algorithm. Expert Syst Appl 178:115040","journal-title":"Expert Syst Appl"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01100-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-022-01100-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01100-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T01:13:24Z","timestamp":1669166004000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-022-01100-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,2]]},"references-count":51,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["1100"],"URL":"https:\/\/doi.org\/10.1007\/s00607-022-01100-6","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,2]]},"assertion":[{"value":"21 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest Statement"}}]}}